hoheinzollern / workshop-cybersikkehed
Workshop on binary exploitation for the Danish Cybersecurity Championships
☆16Updated 6 months ago
Related projects: ⓘ
- ☆8Updated 9 months ago
- ☆14Updated last year
- Writeups of previous editions☆71Updated 7 months ago
- Learn Binary Exploitation with sample problems and solutions☆116Updated last year
- Stash for Binary Exploitation and Reverse Engineering Resources☆96Updated 4 years ago
- CTF writeups from The Flat Network Society☆127Updated 2 months ago
- knowledge is power☆196Updated 5 months ago
- Example pwnable challenge hosted with docker☆214Updated 6 months ago
- This a collection of the code that I have written for the Poor Man's Pentest presentation.☆550Updated 3 years ago
- The bot of John Hammond discord using discord.py☆24Updated 5 months ago
- Instructions on how to create your very own Pwnbox, originally created by HTB☆382Updated last year
- pwninit - automate starting binary exploit challenges☆847Updated last month
- Reverse Engineering Resources☆224Updated 6 years ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆517Updated this week
- #NC3CTF2020 Jule hacker-konkurrence afholdt af Rigspolitiet, NC3☆7Updated 3 years ago
- Solving CTF, one pixel at a time☆23Updated 4 years ago
- The purpose of this repository is to archive any extraneous documents, or anything else that really has no specific category but needs a …☆79Updated 5 years ago
- Docker image for attacking cryptography CTF challenges☆93Updated 4 months ago
- This repo is aim to compile all Flare-On challenge's binaries. Update: 2014 -2022.☆288Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆150Updated 2 years ago
- Place for content used during GenCyber camps.☆13Updated 10 months ago
- A Discord bot that provides ctf tools for collaboration in Discord servers!☆127Updated 2 years ago
- These are the labs for my Intro class. Yes, this is public. Yes, this is intentional.☆1,480Updated 3 weeks ago
- Fake msfconsole for the use in demonstrations☆22Updated 3 years ago
- A curated reading list about offensive IT security☆137Updated last week
- Katana - Automatic CTF Challenge Solver in Python3☆1,251Updated 6 months ago
- ☆104Updated 7 months ago
- Automated Recon Script for Hackthebox machines (hackthebox.eu)☆54Updated 4 years ago
- ☆16Updated 2 years ago
- redpwn's challenge deployment system☆23Updated 9 months ago